msoos / grainofsaltLinks
Grain of Salt equation generator
☆16Updated 3 years ago
Alternatives and similar repositories for grainofsalt
Users that are interested in grainofsalt are comparing it to the libraries listed below
Sorting:
- Generator of "nothing-up-my-sleeve" constants☆24Updated 10 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Updated 8 years ago
- CRYPTOGAMS distribution repository☆65Updated 4 months ago
- Oblivious Memory Access under Fully Homomorphic Encryption☆13Updated 10 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆37Updated 11 years ago
- FLECC_IN_C is a FLexible Elliptic Curve Cryptography library written IN C☆18Updated 8 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- SAT instance generator for SHA-1☆49Updated 4 years ago
- DARPA Cyber Grand Challenge OS syscall library☆18Updated 9 years ago
- Code to fuzz bignum libraries☆46Updated 7 years ago
- BRUTUS is an alternative, fast testing framework for CAESAR ciphers.☆24Updated 9 years ago
- Implementation of the key recovery attack against GEA-1 keys (Eurocrypt 2021)☆49Updated 4 years ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Updated 10 years ago
- Haraka is a secure and efficient short-input hash function.☆59Updated 8 years ago
- AVX2 Chacha implementation☆16Updated 12 years ago
- ☆38Updated 8 years ago
- Simple application for playing with elliptic curves☆44Updated 3 years ago
- QARMA block cipher in C☆31Updated 3 years ago
- advanced unix-like hexadecimal editor and debugger☆40Updated 2 years ago
- Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.☆73Updated 8 years ago
- Supporting materials for our EuroS&P paper: Automated Verification for Secure Messaging Protocols and their Implementations: A Symbolic a…☆37Updated 3 years ago
- BAT KEM/Signature Reference Implementation☆23Updated 4 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Updated 3 months ago
- Experimental High Assurance Cryptographic Library☆20Updated 9 years ago
- Checking that functions are constant time with Valgrind☆197Updated 8 years ago
- GOSTBOX -- A 95-byte program for the 256-byte Streebog/Kuznyechik S-Box.☆15Updated 4 years ago
- Lower Size Bounds for Sorting Networks☆46Updated 5 years ago
- How fast can we brute force a 64-bit comparison?☆54Updated 6 years ago
- sign elf binaries with GPG☆17Updated 9 years ago